메뉴 건너뛰기




Volumn 2729, Issue , 2003, Pages 78-95

Unconditional authenticity and privacy from an arbitrarily weak secret

Author keywords

Authentication; Extractors; Information theoretic security; Privacy amplification; Quantum key agreement

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; INFORMATION THEORY;

EID: 35048874991     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45146-4_5     Document Type: Article
Times cited : (60)

References (26)
  • 8
    • 0036040061 scopus 로고    scopus 로고
    • Tight security proofs for the bounded-storage model
    • S. Dziembowski and U. M. Maurer, Tight security proofs for the bounded-storage model, Proceedings of STOC 2002, pp. 341-350, 2002.
    • (2002) Proceedings of STOC 2002 , pp. 341-350
    • Dziembowski, S.1    Maurer, U.M.2
  • 10
    • 85013455236 scopus 로고
    • Codes for interactive authentication
    • Advances in Cryptology - CRYPTO '93, Springer-Verlag
    • P. Gemmell and M. Naor, Codes for interactive authentication, Advances in Cryptology - CRYPTO '93, LNCS, Vol. 773, pp. 355-367, Springer-Verlag, 1993.
    • (1993) LNCS , vol.773 , pp. 355-367
    • Gemmell, P.1    Naor, M.2
  • 12
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. M. Maurer, Conditionally-perfect secrecy and a provably-secure randomized cipher, Journal of Cryptology, Vol. 5, No. 1, pp. 53-66, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.M.1
  • 13
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer, Secret key agreement by public discussion from common information, IEEE Trans. on Information Theory, Vol. 39, No. 3, pp. 733-742, 1993.
    • (1993) IEEE Trans. on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 14
    • 84958670019 scopus 로고    scopus 로고
    • Privacy amplification secure against active adversaries
    • Advances in Cryptology - CRYPTO '97, Springer-Verlag
    • U. M. Maurer and S. Wolf, Privacy amplification secure against active adversaries, Advances in Cryptology - CRYPTO '97, LNCS, Vol. 1294, pp. 307-321, Springer-Verlag, 1997.
    • (1997) LNCS , vol.1294 , pp. 307-321
    • Maurer, U.M.1    Wolf, S.2
  • 15
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
    • U. M. Maurer and S. Wolf, Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result, IEEE Trans. on Information Theory, Vol. 49, No. 4, pp. 822-831, 2003.
    • (2003) IEEE Trans. on Information Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.M.1    Wolf, S.2
  • 16
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
    • U. M. Maurer and S. Wolf, Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition, IEEE Trans. on Information Theory, Vol. 49, No. 4, pp. 832-838, 2003.
    • (2003) IEEE Trans. on Information Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.M.1    Wolf, S.2
  • 17
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
    • U. M. Maurer and S. Wolf, Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification, IEEE Trans. on Information Theory, Vol. 49, No. 4, pp. 839-851, 2003.
    • (2003) IEEE Trans. on Information Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.M.1    Wolf, S.2
  • 18
    • 84977114496 scopus 로고
    • On the impossibility of private key cryptography with weakly random keys
    • Advances in Cryptology - CRYPTO '90, Springer-Verlag
    • J. L. McInnes and B. Pinkas, On the impossibility of private key cryptography with weakly random keys, Advances in Cryptology - CRYPTO '90, LNCS, Vol. 537, pp. 421-436, Springer-Verlag, 1990.
    • (1990) LNCS , vol.537 , pp. 421-436
    • McInnes, J.L.1    Pinkas, B.2
  • 19
    • 0032629108 scopus 로고    scopus 로고
    • Extracting all the randomness and reducing the error in Trevisan's extractors
    • R. Raz, O. Reingold, and S. Vadhan, Extracting all the randomness and reducing the error in Trevisan's extractors, Proceedings of STOC '99, pp. 149-158, 1999.
    • (1999) Proceedings of STOC '99 , pp. 149-158
    • Raz, R.1    Reingold, O.2    Vadhan, S.3
  • 21
    • 84947270656 scopus 로고    scopus 로고
    • How to fool an unbounded adversary with a short key
    • Advances in Cryptology - EUROCRYPT 2002, Springer-Verlag
    • A. Russell and H. Wang, How to fool an unbounded adversary with a short key, Advances in Cryptology - EUROCRYPT 2002, LNCS, Vol. 2332, pp. 133-148, . Springer-Verlag, 2002.
    • (2002) LNCS , vol.2332 , pp. 133-148
    • Russell, A.1    Wang, H.2
  • 22
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 23
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • Advances in Cryptology - CRYPTO '91, Springer-Verlag
    • D. R. Stinson, Universal hashing and authentication codes, Advances in Cryptology - CRYPTO '91, LNCS, Vol. 576, pp. 74-85, Springer-Verlag, 1992.
    • (1992) LNCS , vol.576 , pp. 74-85
    • Stinson, D.R.1
  • 24
    • 84947780088 scopus 로고    scopus 로고
    • Strong security against active attacks in information-theoretic secret-key agreement
    • Advances in Cryptology - ASIACRYPT '98, Springer-Verlag
    • S. Wolf, Strong security against active attacks in information-theoretic secret-key agreement, Advances in Cryptology - ASIACRYPT '98, LNCS, Vol. 1514, pp. 405-419, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1514 , pp. 405-419
    • Wolf, S.1
  • 26
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, No. 8, pp. 1355-1387, 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.